CVE-2017-6471Improper Input Validation in Wireshark

Severity
7.5HIGHNVD
EPSS
0.7%
top 27.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 4
Latest updateMay 14

Description

In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a WSP infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by validating the capability length.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

debiandebian/wireshark< wireshark 2.2.5+g440fd4d-2 (bookworm)
Debianwireshark/wireshark< 2.2.5+g440fd4d-2+3
NVDwireshark/wireshark2.0.02.0.10+1

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-f83h-9cg2-66f9: In Wireshark 22022-05-14
OSV
CVE-2017-6471: In Wireshark 22017-03-04

📋Vendor Advisories

2
Red Hat
wireshark: WSP infinite loop (wnpa-sec-2017-05)2017-03-03
Debian
CVE-2017-6471: wireshark - In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a WSP infinite loop, t...2017

💬Community

2
Bugzilla
CVE-2017-6467 CVE-2017-6468 CVE-2017-6469 CVE-2017-6470 CVE-2017-6471 CVE-2017-6472 CVE-2017-6473 CVE-2017-6474 wireshark: various flaws [fedora-all]2017-03-06
Bugzilla
CVE-2017-6471 wireshark: WSP infinite loop (wnpa-sec-2017-05)2017-03-06